@inproceedings{conf/re/GartnerRBSJ14, added-at = {2024-04-25T00:00:00.000+0200}, author = {Gärtner, Stefan and Ruhroth, Thomas and Bürger, Jens and Schneider, Kurt and Jürjens, Jan}, biburl = {https://www.bibsonomy.org/bibtex/20fb785da49b3b618b4c0979438802179/dblp}, booktitle = {RE}, crossref = {conf/re/2014}, editor = {Gorschek, Tony and Lutz, Robyn R.}, ee = {https://orkg.org/orkg/resource/R211283}, interhash = {6e82b09b43a0b048d37b18f9f962e1b1}, intrahash = {0fb785da49b3b618b4c0979438802179}, isbn = {978-1-4799-3033-3}, keywords = {dblp}, pages = {103-112}, publisher = {IEEE Computer Society}, timestamp = {2024-04-29T07:22:45.000+0200}, title = {Maintaining requirements for long-living software systems by incorporating security knowledge.}, url = {http://dblp.uni-trier.de/db/conf/re/re2014.html#GartnerRBSJ14}, year = 2014 } @inproceedings{Gaertner2014, abstract = {Security is an increasingly important quality facet in modern information systems and needs to be retained. Due to a constantly changing environment, long-living software systems “age” not by wearing out, but by failing to keep up-to-date with their environment. The problem is that requirements engineers usually do not have a complete overview of the security-related knowledge necessary to retain security of long-living software systems. This includes security standards, principles and guidelines as well as reported security incidents. In this paper, we focus on the identification of known vulnerabilities (and their variations) in natural-language requirements by leveraging security knowledge. For this purpose, we present an integrative security knowledge model and a heuristic method to detect vulnerabilities in requirements based on reported security incidents. To support knowledge evolution, we further propose a method based on natural language analysis to refine and to adapt security knowledge. Our evaluation indicates that the proposed assessment approach detects vulnerable requirements more reliable than other methods (Bayes, SVM, k-NN). Thus, requirements engineers can react faster and more effectively to a changing environment that has an impact on the desired security level of the information system. }, added-at = {2014-12-23T19:16:48.000+0100}, author = {Gärtner, Stefan and Ruhroth, Thomas and Bürger, Jens and Schneider, Kurt and Jürjens, Jan}, biburl = {https://www.bibsonomy.org/bibtex/2ff12f20daa5d1ad1e202514e9f1fd0d9/bibsonomyse}, booktitle = {22nd IEEE International Requirements Engineering Conference}, interhash = {6e82b09b43a0b048d37b18f9f962e1b1}, intrahash = {ff12f20daa5d1ad1e202514e9f1fd0d9}, keywords = {myown sysrelevantforl3s}, organization = {IEEE}, pages = {103--112}, timestamp = {2016-01-11T20:13:41.000+0100}, title = {{M}aintaining {R}equirements for {L}ong-{L}iving {S}oftware {S}ystems by {I}ncorporating {S}ecurity {K}nowledge}, year = 2014 }